BYLD Wealth — Security Implementation Plan
Vivek Kumar, Head of Engineering
Security Roadmap
March 2026 · Confidential
9
Sprints
18-week security roadmap
7
Compliance Frameworks
SEBI, DPDP, RBI, PCI DSS+
₹8-13L
Security Budget
VAPT, Legal, Insurance
200+
Adversarial Tests
8 attack categories
02 Sprint-by-Sprint Security Timeline
Deliverable
S1S2S3S4
S5S6S7S8S9
SAST/SCA PipelineStatic analysis + dependency scanning
PII Vault + EncryptionTokenization, AES-256, KMS
MIA Safety PipelineIntent classifier + guardrails
Prompt Injection DefenseInput sanitization + jailbreak tests
Adversarial Testing + VAPT200+ tests, external pen test
Beta Feedback + IterationSecurity hardening from user testing
Compliance HardeningAudit trail + certification prep
Dashboard + Production SecMonitoring, alerting, WAF
Launch Security ReviewFinal sign-off + go/no-go
03 MIA AI Safety Pipeline
1
Intent Classifier
Claude Haiku classifies user intent — financial query, general chat, or adversarial probe
<100ms latency
2
Input Sanitizer
Strips prompt injections, PII leaks, and encoded attack payloads
Regex + ML filter
3
LLM Generation
Sonnet with system guardrails — financial disclaimers, no specific advice
Guardrailed output
4
Output Classifier
Flags responses crossing educational → advisory boundary before delivery
Edu vs Advice gate
04 Adversarial Test Suite Breakdown
05 Regulatory Compliance Matrix
06 Security Budget Allocation
07 PII Protection Architecture
Tokenization Vault
PII stored as irreversible tokens. Original data in isolated vault with strict IAM policies.
AES-256 + HMAC
Field Encryption
Sensitive fields encrypted at application layer before database storage. Per-field key rotation.
AWS KMS envelope
Conversation Scrubbing
Real-time PII detection and redaction in MIA chat logs. No PII reaches analytics pipeline.
NER + regex patterns
Aadhaar Masking
UIDAI-compliant masking — only last 4 digits displayed. Virtual ID support for verification.
UIDAI guidelines